SlideShare une entreprise Scribd logo
1  sur  32
Télécharger pour lire hors ligne
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
We are like other large companies IT departments
Common infrastructure for business units
• Security, Cost Reduction, Compliance
and Privacy are our Top Priorities
• Reactive and Lacks Agility
• Ubiquitous Environments
• The Challenge of Consumerization of
IT
• The Cloud Imperative
• BI & Analytics Rule the Day
• Vendor Consolidation
• IT Simplification and Optimization
• IT Talent Retention and Attraction
• IT Business Alignment, Prioritization
and Partnership
• Innovation that Drives Productivity
• Being Microsoft’s First and Best
Customer
• Perpetual Software Deployments
• CIO-Led Revenue Growth & Customer
Engagement
• Running an Enterprise on Beta
Release Software
• A Company of 95,000 CIO’s
• Biggest Target for Security Attacks
• Moving from a Code Centric to a Data
Centric Organization
• Moving from Functional Based Org to
a Process Centric Org Model
• Self Service Model
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
• Cloud
• Consumerization of IT
• Data Explosion
• Social Media
• Regulatory Compliance
• Security Threat Growth
IT of the Future : Evolution of MS IT
6
FY05
Business Unit IT
FY07
Centralized IT
FY10
Standardized IT
FY12+
Process-Centric IT
“Virtually everything in
business today is an
undifferentiated
commodity, except how a
company manages its
information. How you
manage information
determines whether you
win or lose.”
– Bill Gates
investment
Industry Trends
Cost Reduction & Operational Efficiency
Risk Management & Compliance
Competitive Differentiation
Business Growth & Sales Performance
Business Process Simplification
 Big Data
 Business Intelligence & Analytics
 Security
 Risk Management
 Mobility & Consumerization of IT
 Social Media and Computing
 Cloud Computing
 Virtualization
 ERP & CRM
 Business Process Management & Alignment
Business scorecard
Overall user satisfaction (NSAT) Metric
sustained at 135 but missed target mainly due to
limited Direct Access deployment with Win 8
release
Identified programs/projects follow key ITLC
controls: Q2 measure = 99%; recovering trend
from get to green program
First and Best plan of record (+28% from FY13
Q1) - FY13 Q2 Dynamics CRM Next CRM online
not released to MSIT; data sync issues from
Microsoft AD and MS online services;
% Shared goals met (3 red programs, Azure,
Dynamics CRM Next, Office 365 SharePoint online;
one yellow, Internet Explorer 10)
Security Health Index BitLocker compliance
FY13 H1 misses
Scorecard
Top programs
SharePoint solution and collaboration platform
Q1 Q2 H1
Baseline H1 Target Stretch Owner
Value Value Value
CIO scorecard
Strengthen partnerships
Business value realization (BVR) 37% 55% 55% -- 25% 25% Jim DuBois
Overall user experience (NSAT) -- -- 135 135 133 139 144 Walter Puschner
% of LOB QBRs utilizing key artifacts: (COS, ProForma, SoaP) -- -- 90% 90% 84% 85% 90% Shahla Aly
MS first and best (partnership health) -- -- -- -- Annual -- 74% 75% 77% Jim DuBois
Business partner satisfaction -- -- -- -- Annual -- 151 154 158 Walter Puschner
Enable revenue
MS first and best (plan of record) 64% 92% 92% 100% 100% 100% Jim DuBois
Aggregate revenue value addressed by MSIT engagements $401.9M $1,389M $1,389M N/A $1,290M $1,419M Walter Puschner
Deliver quality
Risk management (# of past due items) 0 0 0 0 0 0 Bret Arsenault
Identified programs/projects follow key ITLC controls 87% 99% 93% 89% 95% 97% Kurt Samuelson
Digitize process
Application reduction 1,080 1,065 1,065 1,093 1,073 1,065 Jacky Wright
Business processes base-lined 100% 100% 100% 95% 95% 100% Jacky Wright
Data models defined and implemented 100% 100% 100% N/A 95% 100% Jacky Wright
End-to-end user scenarios defined 100% 100% 100% N/A 95% 100% Kurt Samuelson
Lead with innovation
% Shared goals met 87% 87% 87% 90% 90% 92% Jim DuBois
Optimize IT
Program delivery on-time (BL-SL) 88% 94% 91% 89% 90% 92% Kurt Samuelson
Fiscal responsibility (QTD variance to budget) 1.0% 0.9% 0.9% -2.5% 3% 0% Matt Kellerhals
Program delivery (on budget) -- -- 47% 47% 44% 40% 42% Matt Kellerhals
Hard benefits and cost avoidance $14.8M $27.8M $27.8M $57M $20M $26M Jacky Wright
Application availability 99.97% 99.97% 99.97% 99.93% 99.90% 99.95% Jacky Wright
Stay current - OS 94% 95% 95% 92% 80% 85% Walter Puschner
Security health index 96% 92% 94% 97% 95% 100% Bret Arsenault
Windows Server 2012 adoption 1% 3% 3% N/A 15% 17% Walter Puschner
Invest in our people
IT WHI -- -- -- -- Annual -- 74% 76% 77% John Williams
Top programs for FY13 Overall Scope Schedule Budget Adoption
BI business self service
DAX phase 1
Enterprise job automation
Enterprise security platform
Enterprise service bus
Incentive compensation – ENTICE next gen platform
Laminar
Lotus – phase 1
MS Cloud
MS Sales
MSCOM analytics and reporting
OA 3.0 – Windows client – quarterly release
One plan – Channel Incentives
Project Tiger
SharePoint solution and collaboration platform
Updated EA
6
107
Countries
586 Buildings
94k
Mobiles Sync
2,400
1,300
17,000
Wireless
access points
Low bandwidth Internet
Connected Office (ICO2)
Corp Net Connected via
tunnel
Products file share only
Mix of Wired and Wireless
Native Connection
When Mobile – DA and
VPN
Good bandwidth
Internet or ICO1
Products file share only
Mix of Wired and Wireless
Native Connection
Always Mobile - DA and
VPN
Metered Networks -
possible poor bandwidth
Internet or ICO1
Products file share only
Mix of Wired and Wireless
Native Connection
Always Mobile - VPN to
control network usage
Good bandwidth
Corp Net Connected
WDS, OSD, and Products
file share
Mix of Wired (WDS &
OSD) and Wireless
(Products file share)
Native Connection
When Mobile - DA
preferred solution
56% a month
Misplace a Device
1 in 30 mins
iPhone is lost
SecurityofDigitalAssets
Time
Anywhere Access
• Full Network access,
requires Strong
AuthN
Identity
Device
Location
Data /
Application
0 – 100%
• Live ID vs. Active Directory
• Strong Auth vs. Username/
Password
0 – 100%
• Approved / Authenticated
• Managed, Self-Managed,
unmanaged
0 – 100%
• IPv4 vs. US
• Internal vs. External
• Country Location
LBI/MBI/
HBI
• LBI, MBI, HBI Data
• Applications (Corporate,
Consumer, Signed)
Factors
Assurance
Level Examples Variable User Experience (VUE)
• Full access , but no
local data, Strong
Auth required
• Linked Network,
Web Apps, simple
AuthN
• No Access, Guest
Internet
Computed
Access
Secure the Network
Perimeter
Secure the Network
Interior
Secure Key Assets
Monitor and Audit
HBI
MBI
LBI
IPSec Boundary
Domain joined systems
(Secure Net)
Remote access
clients/dial-up
Non-Corp
domain
machines
Labs
~70.000
All Devices
~800,000Domain
Joined
Devices
~320,000
Devices managed
through Config Mgr:
~330,000
Datacenter : ~31,500
Separate
Config Mgr
Hierarchies
Cooperative computer management model
MSIT & users working together
10 languages support for patching
Completely Centralized
Administration
IPSec
Microsoft IT Environment
Managing Everything that Should be Managed
Strong
Password
Requirements
Passwords expire every 70 days
Administrator-level passwords are 15 alphanumeric
characters in length
User passwords are at least eight alphanumeric
characters in length
Passwords contain uppercase and lowercase
characters, digits, and punctuation
Passwords do not contain slang, dialect, or jargon in
any language, or are not based on personal
information such as family names
New passwords vary significantly from prior
passwords
DA / VPN
EAS
OWA
Smart Cards for
RAS
CARD
MANAGEMENT
Card Issuance
Cert approvals
Distribution & Support
Policy & Exception
Management
DELEGATES
Submits Certificate
requests on user’s
behalf
Distribution
USERS
PIN resets
Certificate renewal
•
•
• Seamless
connectivity
experience across a
plethora of devices
• TPM chip
• Smart card with a
valid certificate and a
smart card reader
 Transistion Services
 ISATAP, NAP-PT, Teredo, 6to4
 2 Factor Authentication (2FA)
 IPSec encryption & authentication
 GPO for Client configuration
 Network Access Protection (IPSec-WSHA) for Security.
 Split-Tunnel Configuration (less traffic on proxy servers)
 Remediation Servers
Authentication on
- Identity
- Group and role
- Across perimeter, internal
network, host
Governance and risk
management
- Central policy defines
‘healthy’
- Compliance reported,
tracked
- Compliance used for
authorization
On Premises
On Cloud
Extranet
CorpNet
Web Role
Worker
Role
Azure
Storage
App Fabric
Transport
Connectivity
(Ex. Azure Connect,
Custom Plug-
In/extension)
Data
Connectivity
(Ex. Azure Data
Sync, Custom
Plug-In/Extension)
Client
SQL
Server
Web
ServicesCorp STS
ADFS
SQL Azure
Web Role
App Monitoring
Keynote (monitoring)
System Monitoring
Accesses Control
Service
Cache
Service BusEmployees
Partners
Customers
AzureCDN
Identity
Providers
External
Partners
Windows
Live ID
Org ID
20%
30%
% Vulnerable Clients
48hrs 5 Days – SMS Forced patching begins for normal cycle 24 Days
2%
High
Client Impact
Low
Client Impact
Current days to exploit = 3 days
24 days average to 98% secured
24hrs
5%
7 Days – Port shutdowns begin
3%
Microsoft Update; E-mail & ITWeb Notification (Optional)
SCCM Updates Management (Voluntary > Forced)
SER Scanning & Scripted Updating
Port Shutdowns
Users can install and run non-standard
applications
Even standard users can install some types
of software
Unauthorized applications may:
Introduce malware
Increase helpdesk calls
Reduce user productivity
Undermine compliance efforts
Block unauthorized P2P applications
Easily create and manage flexible rules
using Group Policy
Built-in feature of Windows 7 and
Windows Server 2008 R2
Improved system management
Improved legal compliance
Reduced support costs
Microsoft IT awareness campaign
Open Methodology based on MS Culture.
1.5 % Exception request
Build an isolated reference machine when
deploying AppLocker
Using Audit-only mode to test enforcement
settings
Exported the GPO from reference machine
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
 Protection of intellectual
property
 Greater sharing of sensitive
information
 Simple tools for users
 using any RMS-enabled
application
 Verification of usage
policies is transparent to
users
 Powerful document
protection features
 Persistent file-level
protection extends and
enhances security efforts
 Ease of implementation for IT
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)
http://NowYouKnow - What you will find
3
1
Domain Joined Non Domain Joined
MSIT Standards PC with TPM PC w/o TPM PC MS Phone Non-PC Device
MSIT Standards
Enterprise Class
PCs with TPM
Consumer PCs MSIT Standards Windows Mobile Windows 8 RT
Sony, ASUS…Acer
Enterprise Class
and Consumer
PCs
Android and
Future Chrome
OS devices
Apple Mac with
Bootcamp
Apple Mac with
Bootcamp
Apple Mac with
Mac OS X
iPhone & iPad
MSIT Services
Helpdesk Hardware Support Yes Best Effort Best Effort Maybe No No
Helpdesk Software Support Yes Yes Yes Yes Yes
LOB Applications Yes Yes Yes Yes Yes No
Patching Yes Yes Yes No No No
Driver support in MSIT
Images
Yes No No Maybe No No
Bit-Locker+ TPM Yes Manually No * No No No *
UEFI BIOS Pending Pending Pending Pending No No
Direct Access Yes Probably No No No No
VPN with Smartcard Yes Yes Yes Yes No No
WIFI Yes Yes Yes Yes Yes No-Android
Exchange Yes Yes Yes Yes Yes Limited
Corporate Access Yes Yes Yes Limited Limited Limited
Lync / UC Yes Yes Yes Yes Yes No
* Concerns with PII / HBI data loss
Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)

Contenu connexe

Tendances

SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...SolarWinds
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxSolarWinds
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For VirtualizationPatricio Campos
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module Cisco Canada
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceSolarWinds
 
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...SolarWinds
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudZscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
SolarWinds Government and Education Webinar: Optimizing the Orion Platform
SolarWinds Government and Education Webinar: Optimizing the Orion PlatformSolarWinds Government and Education Webinar: Optimizing the Orion Platform
SolarWinds Government and Education Webinar: Optimizing the Orion PlatformSolarWinds
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSolarWinds
 
ibm språkbanken websphere
ibm språkbanken websphereibm språkbanken websphere
ibm språkbanken webspherealkfdsj
 
Information Security
Information SecurityInformation Security
Information SecurityMohit8780
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges SolarWinds
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will loveZscaler
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmySolarWinds
 

Tendances (20)

SolarWinds Online Federal User Group
SolarWinds Online Federal User GroupSolarWinds Online Federal User Group
SolarWinds Online Federal User Group
 
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
Government and Education Webinar: Leveraging SolarWinds to Improve Remote Emp...
 
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over InfobloxTop 5 Reasons To Consider SolarWinds IPAM Over Infoblox
Top 5 Reasons To Consider SolarWinds IPAM Over Infoblox
 
F5 Value For Virtualization
F5 Value For VirtualizationF5 Value For Virtualization
F5 Value For Virtualization
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
Solarwinds overview 2013 original
Solarwinds overview 2013 originalSolarwinds overview 2013 original
Solarwinds overview 2013 original
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module
 
Government and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application PerformanceGovernment and Education Webinar: Improving Application Performance
Government and Education Webinar: Improving Application Performance
 
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
Federal Webinar: Application monitoring for on-premises, hybrid, and multi-cl...
 
vDesk Overview
vDesk OverviewvDesk Overview
vDesk Overview
 
Three Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the CloudThree Key Steps for Moving Your Branches to the Cloud
Three Key Steps for Moving Your Branches to the Cloud
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
SolarWinds Government and Education Webinar: Optimizing the Orion Platform
SolarWinds Government and Education Webinar: Optimizing the Orion PlatformSolarWinds Government and Education Webinar: Optimizing the Orion Platform
SolarWinds Government and Education Webinar: Optimizing the Orion Platform
 
Simplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your LogsSimplify Troubleshooting With Context in Your Logs
Simplify Troubleshooting With Context in Your Logs
 
ibm språkbanken websphere
ibm språkbanken websphereibm språkbanken websphere
ibm språkbanken websphere
 
Information Security
Information SecurityInformation Security
Information Security
 
World Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONEWorld Wide Technology Introduces Cisco ONE
World Wide Technology Introduces Cisco ONE
 
Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges Government and Education Webinar: Conquering Remote Work IT Challenges
Government and Education Webinar: Conquering Remote Work IT Challenges
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will love
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
 

En vedette

Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...
Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...
Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...Microsoft Technet France
 
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Microsoft Technet France
 
Создание базы данных метаданных университетских геопорталов на портале УНИГЕО
Создание базы данных метаданных университетских геопорталов на портале УНИГЕОСоздание базы данных метаданных университетских геопорталов на портале УНИГЕО
Создание базы данных метаданных университетских геопорталов на портале УНИГЕОUNIGEO
 
О конкурсе РФФИ по актуальным междисциплинарным темам
О конкурсе РФФИ по актуальным междисциплинарным темамО конкурсе РФФИ по актуальным междисциплинарным темам
О конкурсе РФФИ по актуальным междисциплинарным темамUNIGEO
 

En vedette (6)

Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...
Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...
Le datacenter élastique d'avanade, gestion unifiée du cloud privé et refactur...
 
Naturalburial
NaturalburialNaturalburial
Naturalburial
 
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
Automatisez, visualisez et améliorez vos processus d’entreprise avec Nintex
 
Создание базы данных метаданных университетских геопорталов на портале УНИГЕО
Создание базы данных метаданных университетских геопорталов на портале УНИГЕОСоздание базы данных метаданных университетских геопорталов на портале УНИГЕО
Создание базы данных метаданных университетских геопорталов на портале УНИГЕО
 
О конкурсе РФФИ по актуальным междисциплинарным темам
О конкурсе РФФИ по актуальным междисциплинарным темамО конкурсе РФФИ по актуальным междисциплинарным темам
О конкурсе РФФИ по актуальным междисциплинарным темам
 
Slide jne
Slide jneSlide jne
Slide jne
 

Similaire à Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)

Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?Callidus Software
 
10 Reasons Why Smart Organizations are Moving to Cloud BI
10 Reasons Why Smart Organizations are Moving to Cloud BI10 Reasons Why Smart Organizations are Moving to Cloud BI
10 Reasons Why Smart Organizations are Moving to Cloud BIGoodData
 
Computo en la nube moda o valor de negocio v2
Computo en la nube   moda o valor de negocio v2Computo en la nube   moda o valor de negocio v2
Computo en la nube moda o valor de negocio v2anapelizondo
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Doeren Mayhew
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101QOS Networks
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slidesharepapdev
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudVISI
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicAmazon Web Services
 
Building and Operating Clouds
Building and Operating CloudsBuilding and Operating Clouds
Building and Operating CloudsBMC Software
 
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Precisely
 
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...SL Corporation
 
What do I know about my customers?
What do I know about my customers?What do I know about my customers?
What do I know about my customers?DataValueTalk
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT SpendingKokLeong Ong
 
Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...
Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...
Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...Yokogawa1
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM
 

Similaire à Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT) (20)

Microsoft Cloud
Microsoft CloudMicrosoft Cloud
Microsoft Cloud
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?Is On-Demand SPM Right For Your Company?
Is On-Demand SPM Right For Your Company?
 
10 Reasons Why Smart Organizations are Moving to Cloud BI
10 Reasons Why Smart Organizations are Moving to Cloud BI10 Reasons Why Smart Organizations are Moving to Cloud BI
10 Reasons Why Smart Organizations are Moving to Cloud BI
 
Computo en la nube moda o valor de negocio v2
Computo en la nube   moda o valor de negocio v2Computo en la nube   moda o valor de negocio v2
Computo en la nube moda o valor de negocio v2
 
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3Aicpa tech+panel presentation t6 managing risks and security 2014 v3
Aicpa tech+panel presentation t6 managing risks and security 2014 v3
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101Not Your Mother's SD-WAN 101
Not Your Mother's SD-WAN 101
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
briefing
briefingbriefing
briefing
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the Cloud
 
Real-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo LogicReal-time Visibility at Scale with Sumo Logic
Real-time Visibility at Scale with Sumo Logic
 
Building and Operating Clouds
Building and Operating CloudsBuilding and Operating Clouds
Building and Operating Clouds
 
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
Ask the Experts Panel: How Customers Add Value to ServiceNow Discovery and Se...
 
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
Give ‘Em What They Want! Self-Service Middleware Monitoring in a Shared Servi...
 
What do I know about my customers?
What do I know about my customers?What do I know about my customers?
What do I know about my customers?
 
Transformation of IT Spending
Transformation of IT SpendingTransformation of IT Spending
Transformation of IT Spending
 
Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...
Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...
Foundation, Transition, Transform – Koch’s Journey Toward The Plant of the Fu...
 
Cloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask YouCloud Computing for CPAs: What Your Client Will Ask You
Cloud Computing for CPAs: What Your Client Will Ask You
 
IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer IBM Relay 2015: Cloud is All About the Customer
IBM Relay 2015: Cloud is All About the Customer
 

Plus de Microsoft Technet France

Comment réussir votre déploiement de Windows 10
Comment réussir votre déploiement de Windows 10Comment réussir votre déploiement de Windows 10
Comment réussir votre déploiement de Windows 10Microsoft Technet France
 
Fusion, Acquisition - Optimisez la migration et la continuité des outils col...
 Fusion, Acquisition - Optimisez la migration et la continuité des outils col... Fusion, Acquisition - Optimisez la migration et la continuité des outils col...
Fusion, Acquisition - Optimisez la migration et la continuité des outils col...Microsoft Technet France
 
Wavestone déploie son portail Powell 365 en 5 semaines
Wavestone déploie son portail Powell 365 en 5 semainesWavestone déploie son portail Powell 365 en 5 semaines
Wavestone déploie son portail Powell 365 en 5 semainesMicrosoft Technet France
 
Retour d’expérience sur le monitoring et la sécurisation des identités Azure
Retour d’expérience sur le monitoring et la sécurisation des identités AzureRetour d’expérience sur le monitoring et la sécurisation des identités Azure
Retour d’expérience sur le monitoring et la sécurisation des identités AzureMicrosoft Technet France
 
Scénarios de mobilité couverts par Enterprise Mobility + Security
Scénarios de mobilité couverts par Enterprise Mobility + SecurityScénarios de mobilité couverts par Enterprise Mobility + Security
Scénarios de mobilité couverts par Enterprise Mobility + SecurityMicrosoft Technet France
 
SharePoint Framework : le développement SharePoint nouvelle génération
SharePoint Framework : le développement SharePoint nouvelle générationSharePoint Framework : le développement SharePoint nouvelle génération
SharePoint Framework : le développement SharePoint nouvelle générationMicrosoft Technet France
 
Stockage Cloud : il y en aura pour tout le monde
Stockage Cloud : il y en aura pour tout le mondeStockage Cloud : il y en aura pour tout le monde
Stockage Cloud : il y en aura pour tout le mondeMicrosoft Technet France
 
Bien appréhender le concept de Windows As a Service
Bien appréhender le concept de Windows As a ServiceBien appréhender le concept de Windows As a Service
Bien appréhender le concept de Windows As a ServiceMicrosoft Technet France
 
Protéger vos données avec le chiffrement dans Azure et Office 365
Protéger vos données avec le chiffrement dans Azure et Office 365Protéger vos données avec le chiffrement dans Azure et Office 365
Protéger vos données avec le chiffrement dans Azure et Office 365Microsoft Technet France
 
Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...
Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...
Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...Microsoft Technet France
 
Comprendre la stratégie identité de Microsoft
Comprendre la stratégie identité de MicrosoftComprendre la stratégie identité de Microsoft
Comprendre la stratégie identité de MicrosoftMicrosoft Technet France
 
Vous avez dit « authentification sans mot de passe » : une illustration avec ...
Vous avez dit « authentification sans mot de passe » : une illustration avec ...Vous avez dit « authentification sans mot de passe » : une illustration avec ...
Vous avez dit « authentification sans mot de passe » : une illustration avec ...Microsoft Technet France
 
Déploiement hybride, la téléphonie dans le cloud
Déploiement hybride, la téléphonie dans le cloudDéploiement hybride, la téléphonie dans le cloud
Déploiement hybride, la téléphonie dans le cloudMicrosoft Technet France
 
Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...
Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...
Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...Microsoft Technet France
 
SharePoint 2016 : architecture, déploiement et topologies hybrides
SharePoint 2016 : architecture, déploiement et topologies hybridesSharePoint 2016 : architecture, déploiement et topologies hybrides
SharePoint 2016 : architecture, déploiement et topologies hybridesMicrosoft Technet France
 
Gestion de Windows 10 et des applications dans l'entreprise moderne
Gestion de Windows 10 et des applications dans l'entreprise moderneGestion de Windows 10 et des applications dans l'entreprise moderne
Gestion de Windows 10 et des applications dans l'entreprise moderneMicrosoft Technet France
 
Office 365 dans votre Système d'Informations
Office 365 dans votre Système d'InformationsOffice 365 dans votre Système d'Informations
Office 365 dans votre Système d'InformationsMicrosoft Technet France
 
Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...
Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...
Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...Microsoft Technet France
 

Plus de Microsoft Technet France (20)

Comment réussir votre déploiement de Windows 10
Comment réussir votre déploiement de Windows 10Comment réussir votre déploiement de Windows 10
Comment réussir votre déploiement de Windows 10
 
OMS log search au quotidien
OMS log search au quotidienOMS log search au quotidien
OMS log search au quotidien
 
Fusion, Acquisition - Optimisez la migration et la continuité des outils col...
 Fusion, Acquisition - Optimisez la migration et la continuité des outils col... Fusion, Acquisition - Optimisez la migration et la continuité des outils col...
Fusion, Acquisition - Optimisez la migration et la continuité des outils col...
 
Wavestone déploie son portail Powell 365 en 5 semaines
Wavestone déploie son portail Powell 365 en 5 semainesWavestone déploie son portail Powell 365 en 5 semaines
Wavestone déploie son portail Powell 365 en 5 semaines
 
Retour d’expérience sur le monitoring et la sécurisation des identités Azure
Retour d’expérience sur le monitoring et la sécurisation des identités AzureRetour d’expérience sur le monitoring et la sécurisation des identités Azure
Retour d’expérience sur le monitoring et la sécurisation des identités Azure
 
Scénarios de mobilité couverts par Enterprise Mobility + Security
Scénarios de mobilité couverts par Enterprise Mobility + SecurityScénarios de mobilité couverts par Enterprise Mobility + Security
Scénarios de mobilité couverts par Enterprise Mobility + Security
 
SharePoint Framework : le développement SharePoint nouvelle génération
SharePoint Framework : le développement SharePoint nouvelle générationSharePoint Framework : le développement SharePoint nouvelle génération
SharePoint Framework : le développement SharePoint nouvelle génération
 
Stockage Cloud : il y en aura pour tout le monde
Stockage Cloud : il y en aura pour tout le mondeStockage Cloud : il y en aura pour tout le monde
Stockage Cloud : il y en aura pour tout le monde
 
Bien appréhender le concept de Windows As a Service
Bien appréhender le concept de Windows As a ServiceBien appréhender le concept de Windows As a Service
Bien appréhender le concept de Windows As a Service
 
Protéger vos données avec le chiffrement dans Azure et Office 365
Protéger vos données avec le chiffrement dans Azure et Office 365Protéger vos données avec le chiffrement dans Azure et Office 365
Protéger vos données avec le chiffrement dans Azure et Office 365
 
Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...
Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...
Protéger votre patrimoine informationnel dans un monde hybride avec Azure Inf...
 
Comprendre la stratégie identité de Microsoft
Comprendre la stratégie identité de MicrosoftComprendre la stratégie identité de Microsoft
Comprendre la stratégie identité de Microsoft
 
Vous avez dit « authentification sans mot de passe » : une illustration avec ...
Vous avez dit « authentification sans mot de passe » : une illustration avec ...Vous avez dit « authentification sans mot de passe » : une illustration avec ...
Vous avez dit « authentification sans mot de passe » : une illustration avec ...
 
Sécurité des données
Sécurité des donnéesSécurité des données
Sécurité des données
 
Déploiement hybride, la téléphonie dans le cloud
Déploiement hybride, la téléphonie dans le cloudDéploiement hybride, la téléphonie dans le cloud
Déploiement hybride, la téléphonie dans le cloud
 
Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...
Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...
Supervisez la qualité des appels Skype for Business Online à l'aide de Call Q...
 
SharePoint 2016 : architecture, déploiement et topologies hybrides
SharePoint 2016 : architecture, déploiement et topologies hybridesSharePoint 2016 : architecture, déploiement et topologies hybrides
SharePoint 2016 : architecture, déploiement et topologies hybrides
 
Gestion de Windows 10 et des applications dans l'entreprise moderne
Gestion de Windows 10 et des applications dans l'entreprise moderneGestion de Windows 10 et des applications dans l'entreprise moderne
Gestion de Windows 10 et des applications dans l'entreprise moderne
 
Office 365 dans votre Système d'Informations
Office 365 dans votre Système d'InformationsOffice 365 dans votre Système d'Informations
Office 365 dans votre Système d'Informations
 
Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...
Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...
Retour d’expérience sur ‘TFS Online’ (VSTS) dans une solution industrielle (c...
 

Dernier

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 

Dernier (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 

Mise en œuvre de la sécurité par l'informatique interne de Microsoft (MSIT)

  • 3. We are like other large companies IT departments Common infrastructure for business units
  • 4. • Security, Cost Reduction, Compliance and Privacy are our Top Priorities • Reactive and Lacks Agility • Ubiquitous Environments • The Challenge of Consumerization of IT • The Cloud Imperative • BI & Analytics Rule the Day • Vendor Consolidation • IT Simplification and Optimization • IT Talent Retention and Attraction • IT Business Alignment, Prioritization and Partnership • Innovation that Drives Productivity • Being Microsoft’s First and Best Customer • Perpetual Software Deployments • CIO-Led Revenue Growth & Customer Engagement • Running an Enterprise on Beta Release Software • A Company of 95,000 CIO’s • Biggest Target for Security Attacks • Moving from a Code Centric to a Data Centric Organization • Moving from Functional Based Org to a Process Centric Org Model • Self Service Model
  • 6. • Cloud • Consumerization of IT • Data Explosion • Social Media • Regulatory Compliance • Security Threat Growth IT of the Future : Evolution of MS IT 6 FY05 Business Unit IT FY07 Centralized IT FY10 Standardized IT FY12+ Process-Centric IT “Virtually everything in business today is an undifferentiated commodity, except how a company manages its information. How you manage information determines whether you win or lose.” – Bill Gates investment Industry Trends
  • 7. Cost Reduction & Operational Efficiency Risk Management & Compliance Competitive Differentiation Business Growth & Sales Performance Business Process Simplification  Big Data  Business Intelligence & Analytics  Security  Risk Management  Mobility & Consumerization of IT  Social Media and Computing  Cloud Computing  Virtualization  ERP & CRM  Business Process Management & Alignment
  • 8. Business scorecard Overall user satisfaction (NSAT) Metric sustained at 135 but missed target mainly due to limited Direct Access deployment with Win 8 release Identified programs/projects follow key ITLC controls: Q2 measure = 99%; recovering trend from get to green program First and Best plan of record (+28% from FY13 Q1) - FY13 Q2 Dynamics CRM Next CRM online not released to MSIT; data sync issues from Microsoft AD and MS online services; % Shared goals met (3 red programs, Azure, Dynamics CRM Next, Office 365 SharePoint online; one yellow, Internet Explorer 10) Security Health Index BitLocker compliance FY13 H1 misses Scorecard Top programs SharePoint solution and collaboration platform Q1 Q2 H1 Baseline H1 Target Stretch Owner Value Value Value CIO scorecard Strengthen partnerships Business value realization (BVR) 37% 55% 55% -- 25% 25% Jim DuBois Overall user experience (NSAT) -- -- 135 135 133 139 144 Walter Puschner % of LOB QBRs utilizing key artifacts: (COS, ProForma, SoaP) -- -- 90% 90% 84% 85% 90% Shahla Aly MS first and best (partnership health) -- -- -- -- Annual -- 74% 75% 77% Jim DuBois Business partner satisfaction -- -- -- -- Annual -- 151 154 158 Walter Puschner Enable revenue MS first and best (plan of record) 64% 92% 92% 100% 100% 100% Jim DuBois Aggregate revenue value addressed by MSIT engagements $401.9M $1,389M $1,389M N/A $1,290M $1,419M Walter Puschner Deliver quality Risk management (# of past due items) 0 0 0 0 0 0 Bret Arsenault Identified programs/projects follow key ITLC controls 87% 99% 93% 89% 95% 97% Kurt Samuelson Digitize process Application reduction 1,080 1,065 1,065 1,093 1,073 1,065 Jacky Wright Business processes base-lined 100% 100% 100% 95% 95% 100% Jacky Wright Data models defined and implemented 100% 100% 100% N/A 95% 100% Jacky Wright End-to-end user scenarios defined 100% 100% 100% N/A 95% 100% Kurt Samuelson Lead with innovation % Shared goals met 87% 87% 87% 90% 90% 92% Jim DuBois Optimize IT Program delivery on-time (BL-SL) 88% 94% 91% 89% 90% 92% Kurt Samuelson Fiscal responsibility (QTD variance to budget) 1.0% 0.9% 0.9% -2.5% 3% 0% Matt Kellerhals Program delivery (on budget) -- -- 47% 47% 44% 40% 42% Matt Kellerhals Hard benefits and cost avoidance $14.8M $27.8M $27.8M $57M $20M $26M Jacky Wright Application availability 99.97% 99.97% 99.97% 99.93% 99.90% 99.95% Jacky Wright Stay current - OS 94% 95% 95% 92% 80% 85% Walter Puschner Security health index 96% 92% 94% 97% 95% 100% Bret Arsenault Windows Server 2012 adoption 1% 3% 3% N/A 15% 17% Walter Puschner Invest in our people IT WHI -- -- -- -- Annual -- 74% 76% 77% John Williams Top programs for FY13 Overall Scope Schedule Budget Adoption BI business self service DAX phase 1 Enterprise job automation Enterprise security platform Enterprise service bus Incentive compensation – ENTICE next gen platform Laminar Lotus – phase 1 MS Cloud MS Sales MSCOM analytics and reporting OA 3.0 – Windows client – quarterly release One plan – Channel Incentives Project Tiger SharePoint solution and collaboration platform Updated EA 6
  • 11. Low bandwidth Internet Connected Office (ICO2) Corp Net Connected via tunnel Products file share only Mix of Wired and Wireless Native Connection When Mobile – DA and VPN Good bandwidth Internet or ICO1 Products file share only Mix of Wired and Wireless Native Connection Always Mobile - DA and VPN Metered Networks - possible poor bandwidth Internet or ICO1 Products file share only Mix of Wired and Wireless Native Connection Always Mobile - VPN to control network usage Good bandwidth Corp Net Connected WDS, OSD, and Products file share Mix of Wired (WDS & OSD) and Wireless (Products file share) Native Connection When Mobile - DA preferred solution
  • 12. 56% a month Misplace a Device 1 in 30 mins iPhone is lost
  • 14. • Full Network access, requires Strong AuthN Identity Device Location Data / Application 0 – 100% • Live ID vs. Active Directory • Strong Auth vs. Username/ Password 0 – 100% • Approved / Authenticated • Managed, Self-Managed, unmanaged 0 – 100% • IPv4 vs. US • Internal vs. External • Country Location LBI/MBI/ HBI • LBI, MBI, HBI Data • Applications (Corporate, Consumer, Signed) Factors Assurance Level Examples Variable User Experience (VUE) • Full access , but no local data, Strong Auth required • Linked Network, Web Apps, simple AuthN • No Access, Guest Internet Computed Access
  • 15. Secure the Network Perimeter Secure the Network Interior Secure Key Assets Monitor and Audit HBI MBI LBI
  • 16. IPSec Boundary Domain joined systems (Secure Net) Remote access clients/dial-up Non-Corp domain machines Labs ~70.000 All Devices ~800,000Domain Joined Devices ~320,000 Devices managed through Config Mgr: ~330,000 Datacenter : ~31,500 Separate Config Mgr Hierarchies Cooperative computer management model MSIT & users working together 10 languages support for patching Completely Centralized Administration IPSec Microsoft IT Environment Managing Everything that Should be Managed
  • 17. Strong Password Requirements Passwords expire every 70 days Administrator-level passwords are 15 alphanumeric characters in length User passwords are at least eight alphanumeric characters in length Passwords contain uppercase and lowercase characters, digits, and punctuation Passwords do not contain slang, dialect, or jargon in any language, or are not based on personal information such as family names New passwords vary significantly from prior passwords
  • 20. CARD MANAGEMENT Card Issuance Cert approvals Distribution & Support Policy & Exception Management DELEGATES Submits Certificate requests on user’s behalf Distribution USERS PIN resets Certificate renewal
  • 22. • Seamless connectivity experience across a plethora of devices • TPM chip • Smart card with a valid certificate and a smart card reader
  • 23.  Transistion Services  ISATAP, NAP-PT, Teredo, 6to4  2 Factor Authentication (2FA)  IPSec encryption & authentication  GPO for Client configuration  Network Access Protection (IPSec-WSHA) for Security.  Split-Tunnel Configuration (less traffic on proxy servers)  Remediation Servers Authentication on - Identity - Group and role - Across perimeter, internal network, host Governance and risk management - Central policy defines ‘healthy’ - Compliance reported, tracked - Compliance used for authorization
  • 24. On Premises On Cloud Extranet CorpNet Web Role Worker Role Azure Storage App Fabric Transport Connectivity (Ex. Azure Connect, Custom Plug- In/extension) Data Connectivity (Ex. Azure Data Sync, Custom Plug-In/Extension) Client SQL Server Web ServicesCorp STS ADFS SQL Azure Web Role App Monitoring Keynote (monitoring) System Monitoring Accesses Control Service Cache Service BusEmployees Partners Customers AzureCDN Identity Providers External Partners Windows Live ID Org ID
  • 25. 20% 30% % Vulnerable Clients 48hrs 5 Days – SMS Forced patching begins for normal cycle 24 Days 2% High Client Impact Low Client Impact Current days to exploit = 3 days 24 days average to 98% secured 24hrs 5% 7 Days – Port shutdowns begin 3% Microsoft Update; E-mail & ITWeb Notification (Optional) SCCM Updates Management (Voluntary > Forced) SER Scanning & Scripted Updating Port Shutdowns
  • 26. Users can install and run non-standard applications Even standard users can install some types of software Unauthorized applications may: Introduce malware Increase helpdesk calls Reduce user productivity Undermine compliance efforts Block unauthorized P2P applications Easily create and manage flexible rules using Group Policy Built-in feature of Windows 7 and Windows Server 2008 R2 Improved system management Improved legal compliance Reduced support costs Microsoft IT awareness campaign Open Methodology based on MS Culture. 1.5 % Exception request Build an isolated reference machine when deploying AppLocker Using Audit-only mode to test enforcement settings Exported the GPO from reference machine
  • 28.  Protection of intellectual property  Greater sharing of sensitive information  Simple tools for users  using any RMS-enabled application  Verification of usage policies is transparent to users  Powerful document protection features  Persistent file-level protection extends and enhances security efforts  Ease of implementation for IT
  • 30. http://NowYouKnow - What you will find 3 1
  • 31. Domain Joined Non Domain Joined MSIT Standards PC with TPM PC w/o TPM PC MS Phone Non-PC Device MSIT Standards Enterprise Class PCs with TPM Consumer PCs MSIT Standards Windows Mobile Windows 8 RT Sony, ASUS…Acer Enterprise Class and Consumer PCs Android and Future Chrome OS devices Apple Mac with Bootcamp Apple Mac with Bootcamp Apple Mac with Mac OS X iPhone & iPad MSIT Services Helpdesk Hardware Support Yes Best Effort Best Effort Maybe No No Helpdesk Software Support Yes Yes Yes Yes Yes LOB Applications Yes Yes Yes Yes Yes No Patching Yes Yes Yes No No No Driver support in MSIT Images Yes No No Maybe No No Bit-Locker+ TPM Yes Manually No * No No No * UEFI BIOS Pending Pending Pending Pending No No Direct Access Yes Probably No No No No VPN with Smartcard Yes Yes Yes Yes No No WIFI Yes Yes Yes Yes Yes No-Android Exchange Yes Yes Yes Yes Yes Limited Corporate Access Yes Yes Yes Limited Limited Limited Lync / UC Yes Yes Yes Yes Yes No * Concerns with PII / HBI data loss